Vulnerability
Code Rules in Vulnerability category
Category | Severity | Name | Description |
---|---|---|---|
Vulnerability | Critical | SHA-1 and Message-Digest hash algorithms should not be used in secure contexts |
This rule states that the SHA-1 and Message-Digest hash algorithms should not be used in secure contexts, as they are no longer considered secure and have been replaced by more secure algorithms. These algorithms can still be used for non-secure purposes, such as verifying file integrity or generating checksums, but should not be used for authentication or other secure operations. It is important to ensure that any applications or systems that use these algorithms are updated to use a more secure algorithm. |